ARTICLES

The Vulnerabilities in Oracle’s Java Card Technology

Recently, a cybersecurity research firm found several vulnerabilities in Oracle's Java card technology. Read on  to know more about it... Recently, a Poland-based cybersecurity research...

Five Vulnerabilities That Affected IBM Watson Explorer and Content Analytics

Recently, five vulnerabilities affected Watson Explorer and Content Analytics meant for IBM Watson. Read on to know more about the vulnerabilities... Recently, five vulnerabilities affected...

How Fujitsu Wireless Keyboards Was Vulnerable to Keystroke Injection Attacks

Recently, Fujitsu wireless keyboards was vulnerable to keystroke injection attacks. Read on to know about it... Recently, Fujitsu wireless keyboards was found to be vulnerable...

All About ‘Bitcoin Investment’ Phishing Campaign

A new malspam ‘Bitcoin Investment’ phishing campaign is said to have delivered clipboard hijacker malware. Read on to know more about this... A new malspam...

NEWS

Google Photos vulnerability exposes geo-location details of users’ images

Source: Cyware | By Ryan Stewart • This vulnerability could allow attackers to infer the metadata of the images stored in Google Photos. • To be...

Ex-employee spills the beans on Uber using spyware to outrun rival...

Source: Cyware | By Ryan Stewart • The spyware enabled the ridesharing company to track its competitor’s cars and capture information such as driver’s name,...

Encrypted traffic from Netflix can reveal user choices as per new...

Source: Cyware | By Ryan Stewart • The study used the popular Netflix movie Black Mirror: Bandersnatch where users can create their own story-line through...

Arbitrary directory deletion vulnerability in WP Fastest Cache plugin patched

Source: Cyware | By Ryan Stewart • The vulnerability CVE-2019-6726 is present during the installation alongside the WP PostRatings plugin. • The flaw can lead to...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...